Advisory: CLSA-2025:1738592614
OS: CentOS Stream 8 ELS
Public date: 2025-02-03 09:23:37
Project: kernel
Version: 4.18.0-553.6.1.el8_10.tuxcare.els7
Errata link: https://errata.tuxcare.com/centos8stream-els/CLSA-2025-1738592614.html
- xsk: fix OOB map writes when deleting elements {CVE-2024-56614} - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer {CVE-2024-53103} - scsi: sg: Fix slab-use-after-free read in sg_release() {CVE-2024-56631} - net: inet: do not leave a dangling sk pointer in inet_create() {CVE-2024-56601} - initramfs: avoid filename buffer overrun {CVE-2024-53142} - wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() {CVE-2024-53156} - ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150} - Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() {CVE-2024-56604} - Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() {CVE-2024-56605} - af_packet: avoid erroring out after sock_init_data() in packet_create() {CVE-2024-56606} - af_packet: Block execution of tasks waiting for transmit to complete in AF_PACKET {CVE-2024-56606} - scsi: bfa: Fix use-after-free in bfad_im_module_exit() {CVE-2024-53227} - net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() {CVE-2024-56602} - net: inet6: do not leave a dangling sk pointer in inet6_create() {CVE-2024-56600} - NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173} - net: af_can: do not leave a dangling sk pointer in can_create() {CVE-2024-56603} - ceph: prevent use-after-free in encode_cap_msg() {CVE-2024-26689} - drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' {CVE-2024-56608} - netfilter: ipset: add missing range check in bitmap_ip_uadt {CVE-2024-53141} - tipc: Fix use-after-free of kernel socket in cleanup_bearer(). {CVE-2024-27043} - smb: client: fix potential UAF in cifs_stats_proc_write() {CVE-2024-35868} - smb: client: fix potential UAF in cifs_stats_proc_show() {CVE-2024-35867} - smb: client: fix potential UAF in smb2_is_valid_lease_break() {CVE-2024-35864} - smb: client: fix potential UAF in smb2_is_valid_oplock_break() {CVE-2024-35863} - smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() {CVE-2024-35861} - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752} - smb: client: fix potential UAF in cifs_debug_files_proc_show() {CVE-2024-26928}
Update command: dnf update kernel*
bpftool-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm perf-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els7.x86_64.rpm